eMaint

CMMS Software

eMaint’s simple and intuitive Computerized Maintenance Management Software (CMMS) interface makes managing maintenance easy for team members at all levels and roles, from maintenance technicians to upper management. With eMaint’s mobile CMMS solution, technicians can view and close out work orders from the field, making it easy to complete work on-the-go. The maintenance data is then transformed into reports that are meaningful to your organization.
Last Updated: 02/24/17

EMC

Product Description

EMC software helps organizations to simplify the tasks involved in managing information. The increased intelligence, protection, and flexibility we provide also helps to simplify the infrastructure on which information resides while increasing the value of this information.
IT departments typically spend most of their resources managing an organization's existing infrastructure. They need to manage all of the information that the organization creates and stores along with a huge number of applications, new rules and regulations, and networks of servers and storage. As a result, IT departments can only apply 20 percent of their resources to new business opportunities.
In response, EMC has pioneered information lifecycle management (ILM) software that helps organizations store, manage, protect, and share information. Last Updated: 01/26/12

IFS

Product Description

IFS Applications is a single, integrated product supporting the management of four core processes: Service and Asset Management, Manufacturing, Projects, and Supply Chain. Combined with our deep industry knowledge and software for critical business processes such as Financials and HR, it is a complete ERP solution for all your business needs. Last Updated: 09/16/15

Iron Mountain, Intellectual Property Management, Inc.

Technology (Source Code) Escrow Services

Iron Mountain's technology/software escrow services ensures trusted third party administration of proprietary information or source code for the benefit of both developers and licensees of technology transaction. This service helps mitigate the risks of doing business with technology developers and engenders trust between the transaction parties.
Last Updated: 02/20/15

Metaforic

Metaforic Core

Metaforic Core™ software analyzes code both statically and dynamically, then automatically injects an optimized schema of various software antibodies into a copy of the source code, which developers then compile and build as normal. Developers never have to interact with the immune system; it is part of the automated build process.
Metaforic Core provides the foundation for all Metaforic software protection; it is a prerequisite for additional Metaforic capabilities:
• Metaforic Authenticator™– Ensures an application is in constant communication with an authentication device or cloud service.
• Metaforic Concealer™– Hides sensitive data and obfuscates sensitive code.
• Metaforic Enhanced Integrator™– Facilitates easy deployment into complex build environments.
Last Updated: 07/05/12